Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 14:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-12_ec280917e09b494eb6abbda0d729cd0d_cryptolocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-12_ec280917e09b494eb6abbda0d729cd0d_cryptolocker.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-12_ec280917e09b494eb6abbda0d729cd0d_cryptolocker.exe
-
Size
34KB
-
MD5
ec280917e09b494eb6abbda0d729cd0d
-
SHA1
f7007675c1346bf95e8d5bf1ba8aed03442d0e62
-
SHA256
fda0b0b9094ec753b16373c64b71ccf5a16ea1f076779c9f74a7b6a192661aad
-
SHA512
5a7bb59061f97bcd9760a98a45d69807272386b96a791e6cd4143806aab544ed583ebb84df1e835ddeccdffc8f1a0b3ba575ab56420accb47fc5f80082e5b952
-
SSDEEP
384:bmM0V/YPvnr801TRoUGPh4TKt6ATt1DqgPa3s/zzoCt9/B1RwFtzxt16g:b7o/2n1TCraU6GD1a4Xt9bRwrbF
Malware Config
Signatures
-
Detection of CryptoLocker Variants 1 IoCs
resource yara_rule behavioral2/files/0x000400000001e980-12.dat CryptoLocker_rule2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation 2024-03-12_ec280917e09b494eb6abbda0d729cd0d_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 1472 rewok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3684 wrote to memory of 1472 3684 2024-03-12_ec280917e09b494eb6abbda0d729cd0d_cryptolocker.exe 87 PID 3684 wrote to memory of 1472 3684 2024-03-12_ec280917e09b494eb6abbda0d729cd0d_cryptolocker.exe 87 PID 3684 wrote to memory of 1472 3684 2024-03-12_ec280917e09b494eb6abbda0d729cd0d_cryptolocker.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-12_ec280917e09b494eb6abbda0d729cd0d_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-12_ec280917e09b494eb6abbda0d729cd0d_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\rewok.exe"C:\Users\Admin\AppData\Local\Temp\rewok.exe"2⤵
- Executes dropped EXE
PID:1472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD58f68afc075e33bd5151c424ddc014ffb
SHA1f0b4738c1cca167d475fc79922b9f334f17666ab
SHA256958df3caffbed78410b8439475b30259ac14f7f7670d73105873c7238517caf0
SHA5129c6b39ef68c77a60da61c9e49fb068f75ad42cb53c2f0dec3e880f4b96d0a4dfa18a450f24dda4a14a6ea4c089b4e9a2fd9e1e20ad2de44fe7626ffbec1ec144